ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION

Page 1

International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011

ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION Jeyamala Chandrasekaran1 Subramanyan B1 and Raman G.S2 1

Department of Information Technology, Thiagarajar College of Engineering, Madurai jeyamala@tce.edu 2

Department of Information Technology, KLN College of Information Technology, Madurai

ABSTRACT The rapid and extensive usage of Internet in the present decade has put forth information security as an utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety of data including text, images, audio and video. With the increasing use of digital techniques for transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity and authenticity of the information poses a major challenge for security professionals and hassled to the major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component of symmetric key algorithms, which performs substitution and is typically used to make the relationship between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory. Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt analysis reported against its design till date because of its salient design features including the key dependant s boxes and complex key generation process. However every new key requires pre-processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it prevents its usage in memory limited applications and embedded systems. The modified design of S boxes maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results on text and Image Encryption show that the modified design of key generation continues to offer the same level of security as the original Blowfish cipher with a less computational overhead in key generation.

KEYWORDS S Box, Chaos, Non Linearity, Symmetric Cryptosystems, Blowfish, Image Encryption

1. INTRODUCTION An S box can be thought of as a miniature substitution cipher. The input to an s box could be a n bit word, but the output can be an m bit word where m and n are not necessarily the same. An S box can be keyed or keyless and linear or non-linear. Shannon suggested that all block ciphers should have two important properties namely diffusion and confusion. The idea of diffusion is to hide the relation ship between the plain text and the cipher text, which will frustrate the adversary who uses cipher text statistics to find the plain text. Diffusion implies that each symbol in the cipher text is dependant on some or all symbols in the plain text. The idea of confusion is to hide the relation ship between the cipher text and the key, which will frustrate the adversary who uses cipher text to find the key. In other words, if a single bit in the key is changed, most or all bits in the cipher text will also be changed. Every iteration makes use of S boxes, P Boxes, and other non linear operations in order to provide diffusion and confusion.

DOI : 10.5121/ijnsa.2011.3415

165


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.